Academic literature on the topic 'Credulous users'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Credulous users.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi, and Catia Trubiani. "A behavioural analysis of credulous Twitter users." Online Social Networks and Media 23 (May 2021): 100133. http://dx.doi.org/10.1016/j.osnem.2021.100133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Harish, Anshal Prasad, Ninad Rane, Nilay Tamane, and Anjali Yeole. "Dr. Phish: Phishing Website Detector." E3S Web of Conferences 297 (2021): 01032. http://dx.doi.org/10.1051/e3sconf/202129701032.

Full text
Abstract:
Phishing is a common attack on credulous people by making them disclose their unique information. It is a type of cyber-crime where false sites allure exploited people to give delicate data. This paper deals with methods for detecting phishing websites by analyzing various features of URLs by Machine learning techniques. This experimentation discusses the methods used for detection of phishing websites based on lexical features, host properties and page importance properties. We consider various data mining algorithms for evaluation of the features in order to get a better understanding of the structure of URLs that spread phishing. To protect end users from visiting these sites, we can try to identify the phishing URLs by analyzing their lexical and host-based features.A particular challenge in this domain is that criminals are constantly making new strategies to counter our defense measures. To succeed in this contest, we need Machine Learning algorithms that continually adapt to new examples and features of phishing URLs.
APA, Harvard, Vancouver, ISO, and other styles
3

Muthukumar, Steffina, S. D. Karthik, Diya D. Jain, and Rohit Ravindran. "Cipher-Policy Attribute-Based Encryption on Cloud Computing." International Journal of Advanced Research in Science, Communication and Technology, May 19, 2021, 7–13. http://dx.doi.org/10.48175/ijarsct-1202.

Full text
Abstract:
Cloud computing has drawn expanding interests from both scholastic and industry in the recent years because of its productiveness and low-cost management. Since it offers different types of assistance in an open organization, it is critical for users to utilize secure information for stockpiling and sharing data to guarantee information classification and data users protection. To safely Protect information, the most broadly utilized technique is encryption. The dual-access control, with regards to cloud-based storage, is a control system over both the data owner and the user who can upload and download files without loss of safety, data[1] and effectiveness. The credulous arrangement is that the user can download the whole database[2]. The framework planned in this paper is when the A user logs in with his credentials and after successful acceptance from the two different administrators, the user will be able to download the file present over the cloud. When a malicious user requests, the administrators can find it because it will generate a null value and they can block the user from downloading the files.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Credulous users"

1

Inoue, Katsumi, Chiaki Sakama, and Lena Wiese. "Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users." In Lecture Notes in Computer Science, 134–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41524-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balestrucci, Alessandro, Rocco De Nicola, Marinella Petrocchi, and Catia Trubiani. "Do You Really Follow Them? Automatic Detection of Credulous Twitter Users." In Intelligent Data Engineering and Automated Learning – IDEAL 2019, 402–10. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33607-3_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hofer-Robinson, Joanna. "Charles Dickens and Metropolitan Improvements." In Dickens and Demolition, 19–50. Edinburgh University Press, 2018. http://dx.doi.org/10.3366/edinburgh/9781474420983.003.0002.

Full text
Abstract:
For readers who are unfamiliar with the historical contexts underpinning London’s improvement in the mid-nineteenth century, Chapter 1 offers an account of the processes and problems of improvement during Dickens’s lifetime. Addressing the fragmentation of the built environment and the diverse actors and institutions who commented on and influenced metropolitan developments, it suggests that the haphazard nature of improvement in the mid-nineteenth century dovetailed generatively with Dickens’s style and popularity, and that this enabled his works to be used effectively to promote urban change. Far from suggesting that people credulously accepted Dickens’s descriptions as “realistic” accounts of contemporary London conditions, however, this chapter (and, indeed, the book as a whole) argues that mid-nineteenth-century users of Dickens treated his novels as a store of widely known imagery that could be superimposed on to the urban environment. Afterlives were self-consciously curated to enable discussion about large and complex social problems, to make users’ critiques more pointed and memorable, or to curate legible representations of the city.
APA, Harvard, Vancouver, ISO, and other styles
4

Keeley, Brian L. "The Credulity of Conspiracy Theorists." In Conspiracy Theories and the People Who Believe Them, 422–31. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190844073.003.0029.

Full text
Abstract:
Where does entertaining (or promoting) conspiracy theories stand with respect to rational inquiry? According to one view, conspiracy theorists are open-minded skeptics, being careful not to accept uncritically common wisdom, exploring alternative explanations of events no matter how unlikely they might seem at first glance. Seen this way, they are akin to scientists attempting to explain the social world. On the other hand, they are also sometimes seen as overly credulous, believing everything they read on the Internet, say. In addition to conspiracy theorists and scientists, another significant form of explanation of the events of the world can be found in religious contexts, such as when a disaster is explained as being an “act of God.” By comparing conspiratorial thinking with scientific and religious forms of explanation, features of all three are brought into clearer focus. For example, anomalies and a commitment to naturalist explanation are seen as important elements of scientific explanation, although the details are less clear. This paper uses conspiracy theories as a lens through which to investigate rational or scientific inquiry. In addition, a better understanding of the scientific method as it might be applied in the study of events of interest to conspiracy theorists can help understand their epistemic virtues and vices.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Credulous users"

1

Balestrucci, Alessandro, Rocco De Nicola, Omar Inverso, and Catia Trubiani. "Identification of credulous users on Twitter." In SAC '19: The 34th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3297280.3297486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balestrucci, Alessandro, and Rocco De Nicola. "Credulous Users and Fake News: a Real Case Study on the Propagation in Twitter." In 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS). IEEE, 2020. http://dx.doi.org/10.1109/eais48028.2020.9122764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography